Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 11 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 18 Nov 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft windows Subsystem For Linux Gui
|
|
| CPEs | cpe:2.3:a:microsoft:windows_subsystem_for_linux_gui:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Microsoft windows Subsystem For Linux Gui
|
Fri, 14 Nov 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:microsoft:windows_subsystem_for_linux:*:*:*:*:*:-:*:* |
Wed, 12 Nov 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows Microsoft windows Subsystem For Linux |
|
| Vendors & Products |
Microsoft
Microsoft windows Microsoft windows Subsystem For Linux |
Tue, 11 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Heap-based buffer overflow in Windows Subsystem for Linux GUI allows an unauthorized attacker to execute code over a network. | |
| Title | Windows Subsystem for Linux GUI Remote Code Execution Vulnerability | |
| Weaknesses | CWE-122 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-02-26T16:57:27.784Z
Reserved: 2025-10-08T20:10:09.349Z
Link: CVE-2025-62220
Updated: 2025-12-11T15:15:23.656Z
Status : Analyzed
Published: 2025-11-11T18:15:49.730
Modified: 2025-11-14T15:53:43.743
Link: CVE-2025-62220
No data.
OpenCVE Enrichment
Updated: 2025-11-12T12:36:33Z